cn

Published on January 2017 | Categories: Documents | Downloads: 44 | Comments: 0 | Views: 378
of 9
Download PDF   Embed   Report

Comments

Content

JNTU ONLINE EXAMINATIONS-2010 [Mid 1 - cn] 1. A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2hours. The time required for the transfer is hours if synchronization is not provided. [01D01] Copyright © by www.uandistar.org a. 12 hours b. 3 hours c. Zero hours d. Infinite 2. The information related to multi-programmed hosts is placed in the header of ' Layer [01D02] a. Application layer b. Transport Layer c. Session layer d. Network Layer. 3. The ' ' Layer is a true end to end layer , from source to destination. [01G01] a. Network Layer. b. Data Link Layer c. Data Layer d. Transport Layer 4. The operation of subnet is controlled by [01G02] a. Network Layer. b. Data Link Layer c. Data Layer d. Transport Layer 5. Accounting Functions are the responsibility of ' ' Layer [01M01] a. Network Layer. b. Data Link Layer c. Data Layer d. Transport Layer 6. Which one of the following is correct?? [01M02] a. Character - represented by One’s Complement b. Character - represented by Two’s Complement c. Integer - represented by ASCII d. Character - represented by Unicode 7. Multiplexing and Demultiplexing of Network connections is by Layer [01M03] a. Network Layer. b. Data Layer c. Data Link Layer d. Transport Layer 8. Two sides cannot attempt the same operation at the same time. This property is accomplished by Layer [01M04] a. Session Layer b. Transport Layer c. Physical Layer d. Network Layer 9. The number of layers in the OSI model is — — — — — — — — [01S01] a. 5 b. 4 c. 7 Copyright © by www.uandistar.org d. 8 10. — — — — — — — Layer contains network virtual terminal [01S02] a. Application layer b. Session layer c. Presentation layer d. Data Link Layer

UandiStar.org

11. Presentation Layer is concerned with — — — — — — — — — — [01S03] a. Synchronization b. Flow Control c. Syntax and Semantics d. File Transfer. 12. Frame boundaries are recognized and created by — — — — — — — — — Layer.[01S04] a. Application layer b. Data Link Layer c. Session layer d. Network Layer. 13. Token Management is the function of — — — — — — — — — — — — Layer.[01S05] a. Application layer b. Data Link Layer c. Session layer d. Network Layer. 14. The function of Physical Layer is — — — — — — — — — — — [01S06] a. Error correction and Detection b. Piggybacking c. Flow Control d. Determine number of volts to represent 1 or 0. 15. Security and privacy are less of an issue for devices in a — — — — — — — —topology [02D01] a. bus b. mesh Copyright © by www.uandistar.org c. star d. tree 16. A network that contains multiple hubs is most likely configured in a — — —— — — — topology [02D02] a. bus b. mesh c. star d. tree 17. In a network with 25 computers, which topology would require the most extensive cabling. [02D03] a. bus b. mesh c. star d. tree 18. A television broadcast is an example of — — — — — — — — — — transmission[02M01] a. Simplex b. half-duplex c. full-duplex d. automatic 19. Which topology features a point-to-point line configuration? [02M02] a. mesh b. star c. bus d. ring 20. In a mesh topology, the relationship between one device and another is — — — — — — — — [02M03] a. primary-to-peer b. peer-to-primary c. primary-to-secondary d. peer-to-peer 21. A cable break in a — — — — — — — — — topology stops all transmission[02M04] a. bus b. mesh c. star d. primary 22. Which topology requires a central controller or hub? [02S01] a. mesh b. star Copyright © by www.uandistar.org c. bus d. ring 23. Which topology requires a multipoint connection? [02S02]

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

a. mesh b. star c. bus d. ring 24. Communication between a computer and a keyboard involves — — — — — — transmission [02S03] a. Simplex b. half-duplex c. full-duplex d. automatic 25. A tree topology is a variation of a — — — — — — — — — topology. [02S04] a. mesh b. star c. bus d. ring 26. In a topology, if there are n devices in a network, each device has n-1 port for cables [02S05] a. mesh b. star c. bus d. ring 27. A — — — — — — — connection provides a dedicated link between two devices. [02S06] a. point - to - point b. multipoint c. primary d. Secondary 28. In a — — — — — — — — — — connection, more than two devices can share a single link. [02S07] a. point - to - point b. multipoint c. primary d. Secondary 29. In — — — — — — — — — — — transmission, the channel capacity is shared by both communicating devices at all times. [02S08] a. Simplex b. half-duplex c. full-duplex d. automatic 30. Which Protocol is used for electronic mail? [03D01] a. TELNET b. NNTP c. HTTP d. SMTP 31. The TCP/IP model has connection less communication in — — — — — — —— Layer [03D02] a. Transport Layer b. Internet layer c. Presentation Layer d. Application Layer 32. The functions of internet Layer in TCP/IP are [03M01] a. Flow Control and Error Control b. Congestion Control and Flow Control c. Packet Routing and Flow Control d. Congestion Control and Packet Routing 33. The protocols used in Host to network layer of TCP/IP model are [03M02] a. TEL NET and LAN b. ARPA NET and SAT NET c. PACKET RADIO and IP d. LAN and IP 34. HTTP is acronym of [03M03] a. Hyper Text Transfer Protocol b. Hyper Test Transfer Protocol c. Hyper Text Transport Protocol d. Hyper Text Transport Program 35. The number of layers in TCP/IP model is — — — — — — — — — [03S01] a. 5 b. 4 c. 6 d. 7 36. Internet Layer in TCP/IP is — — — — — — — — — — [03S02] a. Connection Oriented b. Can be Connection Oriented and connection less c. Connection less

d. Client Server type request 37. The protocol defined by internet layer in TCP/IP is — — — — — — — — [03S03] a. TCP Protocol b. UDP Protocol c. SMTP d. IP Protocol 38. Two protocols defined in Transport Layer of TCP/IP are — — — — — — — — — — [03S04] a. TCP and IP b. TCP and UDP c. UDP and IP Copyright © by www.uandistar.org d. TCP only 39. Which of the following is/are a connection oriented protocol(s)?? — — — — — — — — [03S05] a. TCP b. UDP c. TCP and UDP d. Neither TCP nor UDP 40. UDP has the following properties [03S06] a. Connection oriented and reliable b. Connection Less and reliable c. Connection less and Unreliable d. Connection Oriented and Unreliable 41. Which of the following is the Layers of TCP/IP model?? [03S07] a. Physical, Network, Transport, Application b. Host to Network, Network, Presentation, Application c. Host to Network, Internet, Transport, Application d. Physical, Internet, Session, Application 42. Which Layer contains High-level protocols in TCP/IP model?? [03S08] a. Application b. Presentation c. Transport d. Internet 43. The IP in TCP/IP uses — — — bit addresses but IPX in Novell Netware uses —— — bit addresses [04D01] a. 4, 12 b. 12, 4 Copyright © by www.uandistar.org c. 8, 16 d. 16, 8 44. In the earlier ARPA NET each node of network consisted [04D02] a. TIP & a host b. BBN & a host c. IMP & a host d. SAP & a host 45. Novell Netware is based on — — — — — — — — — — — [04M01] a. XNS b. OSI c. TCP/IP d. TIP 46. The protocols used in Transport layer of Novell Netware — — — — — — — — —[04M02] a. NCP & SAP Copyright © by www.uandistar.org b. NCP & IPX c. NCP & SPX d. NCP & TIP 47. IPX in Novell Netware is functionally similar to — — — — — — — —Protocol [04M03] a. TCP b. IP c. UDP d. SAP 48. The address in Novell Netware contains [04M04] a. 32- bit Network Number, 48-bit Machine Number & 16-bit Local address

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

b. 16- bit Network Number, 32-bit Machine Number & 48-bit Local address c. 48- bit Network Number, 16-bit Machine Number & 32-bit Local address d. 16- bit Network Number, 48-bit Machine Number & 32-bit Local address 49. The physical layer of Novell Netware consists of — — — — — — — — — — —protocol [04S01] a. IPX b. NCP c. SAP d. ARC NET 50. The connection oriented transport protocol in Novell Netware is — — — — —— — — — — [04S02] a. NCP b. IPX c. SAP d. Ethernet 51. IPX is used in — — — — — — — — — — layer of Novell Netware [04S03] a. Application b. Transport c. Network d. Physical 52. Expand SAP in Novell Netware [04S04] a. Service access point b. Special Access Point c. Service access protocol d. Service Advertising Protocol 53. Minicomputers in ARPANET are called [04S05] a. ARPA Computers b. IMP c. BBN d. DARPA Computers 54. Expand TIP in ARPA NET [04S06] a. Touch Interest protocol b. Terminal Interface protocol c. Transport International Protocol d. Terminal Interface protocol 55. — — — was created to organize machines into Domains and map hostnames into IP addresses. [04S07] a. BBN b. IMP c. TIP d. DNS 56. Internet is based on — — — — — — — — — protocol stack. [04S08] a. XNS b. IMP c. TCP/IP d. SAP 57. The topology not used in LAN is — —— — [05D01] a. Ring b. Star c. Bus d. Mesh 58. When packets are small and all are equal sized then they are called — — —— — — — — — [05D02] a. Frames b. Small Packets c. Cells d. Atoms 59. Irregular topologies are used in — — — — — — — — — — [05D03] a. LAN b. WAN c. MAN d. Broadcast Networks 60. Traditional LANs run at the speed of [05M01] a. 100 to 1000 MBPS b. 1000 to 10000 MBPS c. 10 to 100 MBPS d. 10 to 100 GBPS 61. Which of the following is not a characteristic of LAN [05M02] a. Size

b. Transmission Technology c. Topology d. Routers 62. In static allocation of channel in LAN Broadcast Networks — — — — — —— — algorithm is used [05M03] Copyright © by www.uandistar.org a. FCFS b. Round Robin c. Shortest Frame first d. High priority first 63. In— — — — — — — Network, there is a broadcast medium to which all computers are attached [05M04] a. MAN b. LAN c. WAN d. Broadcast Networks 64. Privately owned networks are — — — — — — — — [05S01] a. MAN b. LAN c. WAN d. Broadcast Networks 65. Worst-case time is bounded in — — — — — — — — — — [05S02] a. LAN Copyright © by www.uandistar.org b. MAN c. WAN d. Broadcast Networks 66. Broadcast Networks can be divided into Static and dynamic depending on channel allocation [05S03] a. MAN b. LAN c. Broadcast Networks d. WAN 67. Local Cable TV Network is an example for — — — — — — — — — — [05S04] a. WAN b. Broadcast c. LAN d. MAN 68. The IEEE standard for DQDB is — — — — — — — [05S05] a. 802.3 b. 802.4 c. 802.6 d. 802.5 69. Hosts in WAN are connected by — — — — — — — — — — — — [05S06] a. Communication Line b. Subnet c. Router d. Another host Computer 70. Which one is not a transmission line? [05S07] a. Circuits b. Channels c. Trunks d. Paths 71. Satellite or ground radio is an example for — — — — — — — [05S08] a. WAN b. MAN c. LAN d. Broadcast Networks 72. LASERs face a inhibition on [06D01] a. sunny day b. dry day c. windy day Copyright © by www.uandistar.org d. rainy day 73. — — — — — — — — transmission has more suitable for indoor wireless LANs[06D02] a. radio

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

b. micro wave c. infra red d. light wave 74. — — — — — — — — — category twisted pairs are called as unshielded twisted pair [06D03] a. Category 1 b. Category 3 c. Category 5 d. Category 3 & Category 5 75. Which of the following is not considered an important use of microwaves [06D04] a. Industrial bands b. scientific bands c. medical bands d. entertainment bands 76. The number of oscillations per second of an electromagnetic wave is called its — — — and is measured in — — — [06M01] a. wave length ,mts b. frequency,Hz c. amplitude, mts d. time period, secs 77. The mode of transmission most suitable is — — — — — — — [06M02] a. twisted pair b. fibre optics c. wireless d. coax 78. A modern application to connect the LANs in two buildings is through — —— —— — transmission [06M03] Copyright © by www.uandistar.org a. radio b. micro wave c. infra red d. light wave 79. What is advantage of twists for a wire — — — — — — — [06M04] a. Data lose b. Noise reduction c. No noise d. Added noise 80. In fiber optics a pulse of light indicates — — — — — — [06S01] a. 1 bit b. 0 bit c. 1 byte d. 8 bits 81. — — — — — — kind of coaxial cable is used for analog transmission [06S02] a. Base band b. Broad band c. Category 3 d. Fiber 82. As we go from long-wave radio towards visible light, the waves behave more and more like — — — — and less and less like — — — — — — — — [06S03] a. radio, light b. light., radio c. radio , micro wave d. micro wave, light 83. Multipath fading — — — — — — — — the signal [06S04] a. enhances b. adds to c. cancels d. maximizes

84. In micro wave transmission concentrating all the energy into a small beam using a parabolic antenna gives a — — — — — — signal to noise ratio [06S05] a. lower b. higher c. degraded d. subtle 85. Radio waves are — — — — — — — — — [06S06] a. uni directional b. bi directional c. multidirectional d. omnidirectional 86. The fundamental relation between frequency (f), wave length (l) and speed(c) [06S07] a. f*c1l b. f/l=c c. l*c=f Copyright © by www.uandistar.org d. f*l=c 87. Speed of light is [06S08] a. 3*108 m/s b. 3*108 cm/sec c. 3*109 m/s d. 3*109 cm/sec 88. In transparent Bridges, all the decisions are made by looking into — — — —— — — — — [07D01] a. Advertisement Tables b. Description Tables c. Hash Tables d. Fragment Tables 89. If destination LAN is unknown in Transparent Bridges then we use — —— — — — — — [07D02] a. Link State Routing b. Flooding c. Shortest Path Routing d. Flow Based Routing 90. Which among the below of source routing bridges is complex? [07D03] a. Hardware b. Software c. Hybrid Copyright © by www.uandistar.org d. Remote 91. Configuration of — — — — — — — — — — — — is manual [07D04] a. Transparent b. Spanning Tree c. Remote d. Source Routing 92. In LAN with token ring topology, — — — — — — — — — — — are used [07D05] a. Transparent b. Spanning Tree c. Remote d. Source Routing 93. A configuration of N LANs is linearly connected by 4 bridges. By the time we reach the Nth LAN how many discovery frames will be circulating? [07D06] a. N4 b. 4 c. 4N Copyright © by www.uandistar.org d. N 94. Which of the following is not an internetworking device? [07M01] a. Bridge b. Repeater

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

c. Router d. Cable 95. What type of bridge must have its address table entered manually? [07M02] a. Simple b. Transparent c. Multi port d. Source routing 96. A bridge has access to the — — — — — — — — — address of a station on the same network. [07M03] a. Physical b. Network c. Service access point d. Logical 97. In source routing bridges — — — — — — — frame is used to discover the destination [07M04] a. Discovery b. Control c. Data d. Acknowledgement 98. LANIs can be connected by a device called — — — — — — — — — — [07M05] a. Routers b. Modems c. Ethernet card d. Bridges 99. In — — — — —— — all frames are given to the computer, not to those addressed [07M06] a. Promiscuous mode b. Miscues mode c. Normal mode d. Special Mode 100.— — — — — — Algorithm is used in transparent bridges [07S01] a. Forward Learning b. Backward Learning c. Reverse Backward Learning d. Reverse Forward Learning 101.In transparent bridges the failures are handled by — — — — — — [07S02] a. Host b. Bridge c. Network layer d. Router 102.CSMA/CD and token bus user choose — — — — — — bridge [07S03] a. Source routing bridge b. Transparent bridge c. Remote bridge d. Selective Bridges 103.— — — — — — bridge operates in promiscuous mode [07S04] a. Transparent bridge b. Selective flooding c. Source Routing d. Remote Bridges 104.In source routing bridges each LAN has a unique — — — — — — bit no. [07S05] a. 10 b. 8 c. 16 d. 12 105.Source routing bridges in the same LANs must have — — — — — — — bridge Number [07S06] a. Same b. Different c. Source d. Destination

106.Repeater function in the — — — — — — — — — layer [07S07] a. Physical b. Data link c. Network d. Transport 107.Bridges function in the — — — — — — — layer. [07S08] a. Physical b. Data link Copyright © by www.uandistar.org c. Network d. Transport 108.A repeater takes a weakened or corrupted signal and — — — — — — —it [07S09] a. Amplifies b. Regenerates c. Resample d. Reroute 109.The PSTN is an example of — — — — — — — network [08D01] a. packet-switched b. circuit-switched c. message-switched d. TSI 110.In —— — — — — —, each packet of a message follows the same path from sender to receiver [08D02] a. Circuit switching b. message switching c. a virtual approach to packet switching d. The datagram approach to packet switching 111.In a time division switch, a — — — — — — — governs the destination of a packet stored in RAM [08D03] a. TDM bus b. cross bar c. cross point d. control unit 112.How many cross points are needed in a single stage switch with 40 inputs and 50 outputs [08M01] a. 40 b. 50 c. 90 d. 2000 113.The — — — — — — of A TSI controls the order of delivering of slot values that are stored in RAM [08M02] a. cross bar b. cross point c. control unit d. transreceiver 114.In — — — — — — — circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. [08M03] a. Space-division b. time-division c. virtual Copyright © by www.uandistar.org d. packet 115.To create a — — — — — — —, combine crossbar switches in stages [08M04] a. Multistage switch b. cross point c. packet switch d. TSI 116.In— — — — — each packet of a message need not follow the same path From sender to receiver [08M05] a. Circuit switching b. message switching c. a virtual approach to packet switching d. The datagram approach to packet switching

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

117.An important property of circuit switching is the need to setup an end to-end path — — — — — — — any data can be sent [08S01] a. after b. before c. along with which d. avoiding which 118.The elapsed time between the end of dialing and the start of ringing can be a minimum of — — — [08S02] a. 1sec b. 10sec c. 100sec d. 1000sec 119.A network using message switching is called — — — — — — [08S03] a. store-and-forward b. forward-and-store c. store-and-send Copyright © by www.uandistar.org d. send-and-store 120.— — — — — — — — Networks place a tight upper limit on block size, allowing packets to be buffered in router main memory instead of on disk. [08S04] a. Message switching b. circuit switching c. packet switching d. store-and-forward 121.Which type of switching uses the entire capacity of a dedicated link? [08S05] a. Circuit switching b. datagram packet switching c. virtual circuit packet switching d. Message switching 122.The — — — — — — is a device that connects n inputs to m outputs [08S06] a. Cross point b. cross bar c. modem d. RAM 123.In which type of switching do all the datagrams of a message follow the same channels of a path [08S07] a. Circuit switching b. datagram packet switching c. virtual circuit packet switching d. message switching 124.which ISDN plane is associated with signaling another D channel [09D01] a. user b. control c. management d. supervise 125.When you store and forward messages in B-ISDN, you are using — — — —— — — — services [09D02] a. Conversational b. messaging c. retrieval d. distributive 126.Commercial TV is an example of [09D03] a. messaging services b. Conversational services c. distributional services without user control d. distributional services with user control 127.The normal user interface to an ISDN is PRI or — — — — — — — — — [09D04] a. Bit Rate Interface b. Basic Rate Interface

c. Byte Rate Interface d. Broad Rate Interface 128.The reference point U is a specification for connecting the ISDN office with — — — — — — — [09M01] a. NT1 Copyright © by www.uandistar.org b. NT2 c.TE1 d. TE2 129.A banyan switch parsers the output line number from — — — — — — — —[09M02] a. snake-like b. left to right c. right to left d. top to bottom 130.For n line, the complexity of a batcher switch grows like — — — — — — — — —[09M03] a. Log n b. n2 c. n log n d. n log2 n 131.The ISDN equivalent of DTE is [09M04] a. TE1 b. TE2 c. NT1 d. TA 132.ISDN is an acronym for — — — — — — — —. [09S01] a. Information Services for Digital Networks b. Internetwork System for Data Networks c. Integrated Services Digital Network d. Integrated Signals Digital Network 133.Which of the following channel types is not standardized [09S02] a. 4 kHz analog telephone channel b. 64kbps digital PCM channel for voice or data c. 16 kbps digital channel d. 16 kbps analog channel 134.Equipment that performs functions related to the OSI model’s layers 1, 2, 3 is called — — — — — [09S03] a. NT1 b. NT2 Copyright © by www.uandistar.org c. NT3 d. NT4 135.The key idea behind ISDN is that of the — — — — — — — — —, a conceptual pipe between the customer and the carrier through which bits flow [09S04] a. digital byte pipe b. analog bit pipe c. digital pipe d. digital bit pipe 136.The digital bit pipe can support multiple independent channels by — — — — of the bit stream. [09S05] a. time division multiplexing b. space division multiplexing c. frequency division multiplexing d. amplitude division multiplexing 137.What is PBX [09S06] a. Public Branch eXchange b. Public Band exchange c. Private Branch eXchange d. Public Band eXchange 138.A — — — — — — — — — provides a connection or a set of connection between switches. [10D01] a. Transmission path b. Virtual path c. Virtual circuit d. Virtual connection

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

139.A — — — is the physical connection between an end point and a switch or between two switches. [10D02] a. Transmission path b. Virtual path c. Virtual circuit d. Virtual connection 140.The VPI of a UNI is — — — — — — — — — — — — bits in length [10D03] a. 8 b. 12 c. 16 d. 24 141.The VPI of a NNI is — — — — — — — — — bits in length [10D04] a. 8 b. 12 c. 16 d. 24 142.In a VP switch the — — — — — — — — does not change while the — — — — can change . [10D05] a. VPI, VCI b. VCI, VPI c. VP, VPC d. VPC, VP 143.In a — — — — — — — switch, both the VPI and VCI can changes [10D06] a. VP b. VPC c. VPI d. VCI 144.In the SAR sublayer of , 1 byte of header and 2 bytes of trailer are added to a 45- byte payload. [10M01] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 145.In the SAR sublayer of — — — , the payload is 48 bytes and there is no added header or trailer. [10M02] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 146.A — — — — — — — — — field on a UNI cell header is used for connection purposes. [10M03] a. VPI ( Virtual path identifier) b. VCI (Virtual circuit identifier ) c. CLP(Cell loss priority) d. GFC(generic flow constant) 147.A — — — — — field on a cell header in the ATM layer determines whether a cell can be dropped. [10M04] a. VPI ( Virtual path identifier) b. VCI (Virtual circuit identifier ) c. CLP(Cell loss priority) d. GFC(generic flow constant) 148.ATM multiplexes cells using — — — — — — — — — — [10M05] a. Asynchronous FDM b. Synchronous FDM c. Asynchronous TDM d. Synchronous TDM 149.In an ATM network, all cells belonging to a single message follow the same — — — — — — — and remain in their original order until they reach their destination. [10M06] Copyright © by www.uandistar.org a. Transmission path b. Virtual path c. Virtual circuit d. Virtual connection

150.The ATM — — — — — — — — — sub layer is concerned with getting the bits on and off the wire [10S01] a. Physical Layer b. ATM Layer c. AAL1 d. AAL2 151.In data communications, ATM is an acronym for [10S02] a. Automated Transfer Mode b. Automatic Transfer Modulation c. Automatic Transport Mode d. Asynchronous Transfer Mode 152.Because ATM —— — — — , which means that cells follow the same path, the cells do not usually arrive out of order. [10S03] a. is asynchronous b. is multiplexed c. is a network d. uses virtual circuit routing 153.Which layer in ATM protocol reformats the data received from other networks? [10S04] a. Physical b. ATM c. Application adaptation d. Data adaptation 154.Which layer in ATM protocol has a 53-byte cell as an end product [10S05] a. Physical b. ATM c. Application adaptation d. Data adaptation 155.Which AAL type can best process a data stream having a nonconstant bit rate? [10S06] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 Copyright © by www.uandistar.org 156.Which AAL type is designed to support a data stream that has a constant bit rate? [10S07] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 157.Which AAL type is designed to support conventional packet switching that uses the virtual circuit approach? [10S08] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 158.Which AAL type is designed to support SEAL ? [10S09] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 159.The end product of the SAR is a data packet that is — — — — — — — — — — [10S10] a. Variable in length b. 48 bytes long Copyright © by www.uandistar.org c. 44 to 48 bytes long d. greater than 48 bytes long

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

160.In the SAR sublayer of — — — — — — — — — , 1 byte of header is added to 47 bytes of data. [10S11] a. AAL1 b. AAL2 c. AAL3/4 d. AAL5 161.In ALOHA, the throughput is a maximized by dividing time into — — — — — — — — intervals. [11D01] a. Variable b. Unique c. Discrete d. Continuous 162.In adaptive tree walk protocol, each node at level I has a fraction — — —— of the station below it [11D02] a. 2I b. I2 c. 2 - I d. I - 2 163.In — — — protocol the station transmits with a probability of 1 whenever it finds the channel idle [11M01] a. 1 - persistent CSMA b. p - persistent CSMA c. non - persistent CSMA d. ALOHA. 164.The channel efficiency of bit-map protocol at low load is — — — — — — — [11M02] a. d/(N+d) b. d/(d+1) c. d/(d+log2N) d. N/(d+log2d) 165.The channel efficiency of bit-map protocol at high load is — — — — — — —[11M03] a. d/(N+d) b. d/(d+1) c. d/(d+log2N) d. N/(d+log2d) 166.The channel efficiency of binary-countdown protocol is — — — — — —[11M04] a. d/(N+d) Copyright © by www.uandistar.org b. d/(d+1) c. d/(d+log2N) d. N/(d+log2d) 167.— — — — — — — protocol is widely used on LAN in the MAC sub layer [11S01] a. CSMA b. TCP c. CSMA/CD d. GSM 168.The first collision free protocol is — — — — — — — — — — [11S02] a. Binary countdown b. Basic bitmap c. Reservation protocol d. SAP 169.In binary count down protocol each station address bits are — — — — —[11S03] a. ANDed b. Ex - Ored c. Ored d. NORed 170.Multiple users share a common channel is called — — — — — — — — [11S04] a. LAN Copyright © by www.uandistar.org

b. WAN c. Contention d. CSMA/CD 171.— — — — — — — — — —system is used for ground based radio broadcasting. [11S05] a. Static channel allocation b. Dynamic channel allocation c. ALOHA d. CSMA 172.The mean delay of static channel allocation in LANS and MANS using FDM is — — — — — — — [11S06] a. T=1/A b. T=1/pc c. T 1 1/(pc-A) d. T=1/p 173.The maximum through put of pure ALOHA system is — — — — — — [11S07] a. 18.4 % b. 36.8 % c. 17.4 % d. 34.8 % 174.The maximum through put of slotted ALOHA is — — — — — — — — — [11S08] a. 18.4 % b. 36.8 % c. 17.4 % d. 34.8 % 175.Collision Detection is a/an — — — — — — — — — — process [12D01] a. Digital b. Analog c. Discrete d. Continuous 176.In CSMA/CD the time taken for a station to be sure that it has seized the channel in worst case is — — where t 1 time for signal to propagate between 2 stations [12D02] a. 2t – e b. 2 + t c. 2t d. 2e - t 177.The problem of a station not being able to detect a potential competitor for the medium because competitor is far away is called — — — — — — — — —— [12M01] a. Exposed Station Problem b. Collision Avoidance Problem c. Hidden Station Problem d. Access Grant Problem 178.The problem of a station not being able to detect a potential competitor for the medium because it thinks that there is activity between them is called — — — — — — — — — — — [12M02] a. Exposed Station Problem b. Collision Avoidance Problem c. Hidden Station Problem d. Access Grant Problem 179.Protocols in which stations listen for a carrier and act accordingly are —— — — — — — — [12S01] a. ALOHA b. Multiple access c. Station Model d. CSMA 180.Busy Waiting is found in — — — — — — — — — — — — [12S02] a. ALOHA b. Slotted ALOHA c. 1-persistent CSMA

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

UandiStar.org

d. non-persistent CSMA 181.Contention Slots are not found in — — — — — — — — — [12S03] a. non-persistent CSMA b. CSMA/CD c. Bitmap d. Binary Countdown 182.A problem with Bitmap protocols is an overhead of — — — — — — — — bit(s) per station [12S04] a. 0 b. 1 c. 2 d. 3 183.In adaptive tree walk protocol we use — — — — — — and — — — — — — — searching [12S05] a. Graph and Breadth First b. Tree and Breadth First c. Graph and Depth First d. Tree and Depth First 184.An early protocol for wireless LANs is — — — — — — — — — — — [12S06] a. MACA Copyright © by www.uandistar.org b. ALOHA c. CSMA/CD d. Collision Free 185.A hub is used in — — — — — — — — — — — Ethernet [13D01] a. 10Base 5 b. 10Base 2 c. 10Base – T d. 10Base - F 186.A transceiver cable is used in — — — — — — — — — — Ethernet [13D02] a. 10Base 5 b. 10Base 2 c. 10Base - T d. 10Base - F 187.The protocol used in ETHERNET is [13D03] a. ALOHA b. Binary Count down c. CSMA/CD d. Multiple Access Protocol 188.10 base 5 cabling is called — — — — — — — Ethernet. [13M01] a. Thick b. Thin c. Twisted pair d. Fiber optics 189.In token ring, the length of the token is — — — — — — — — [13M02] a. 4 bytes b. 3 bytes c. 1 bytes d. 2 bytes 190.The protocol in which, after I collisions, a random number between 0 and 2i - 1 number of slots is skipped is called — — — — — — — — [13M03] a. Exponential b. Binary countdown c. Backoff d. Binary exponential backoff 191.In switched 802.3 LANS, each card forms its own — — — — — — —independents of the others [13M04] a. Domain b. Area c. Collision Area d. Collision domain 192.10 base 2 cabling is called — — — — — — — — Ethernet. [13S01] a. Thick b. Thin c. Twisted pair d. Fiber optics 193.802.3 base band systems use — — — — — — — — encoding. [13S02] a. Manchester b. RZ c. NRZ d. RZ or NRZ 194.In 802.3, each frame starts with a — — — — — — — — of 7 bytes [13S03] a. SD b. Preamble c. ED d. pad

195.In 802.3, the high order bit of the destination address is a ’0’ for — — — —— — — addresses [13S04] a. Ordinary b. Group c. Broadcast d. Unicast 196.In 802.3, the address consisting of all 1 bits is reserved for — — — — — — —— [13S05] a. Unicast b. Multicast c. Broadcast d. Ordinary 197.The — — — — — — — — standard describes the upper part of the data link layer. [13S06] a. IEEE 802.2 b. IEEE 802.3 c. IEEE 802.4 d. IEEE 802.5 198.The — — — — — — — — standard describes the CSMA/CD protocol [13S07] a. IEEE 802.2 b. IEEE 802.3 c. IEEE 802.4 d. IEEE 802.5 199.Which IEEE 802 standard does not provide for a collision-free protocol? [14D01] a. 802.2 b. Bit map c. 802.4 d. 802.5 200.In token bus, how does a station transmit data to the destination node? [14D02] a. By seizing token b. By generating token c. By releasing token d. By releasing frame For any queries contact: [email protected] Administrator: Surya Vamsi | www.uandistar.org

100 % free SMS ON<space>UandIStar to 9870807070 for JNTU Alerts, Techology News, Tips/Tricks, JOB Alerts & more......

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close